Searchable encryption provides an effective way for data security and privacy in cloud *** can retrieve encrypted data in the cloud under the premise of protecting their own data security and ***,most of the current c...
详细信息
Searchable encryption provides an effective way for data security and privacy in cloud *** can retrieve encrypted data in the cloud under the premise of protecting their own data security and ***,most of the current content-based retrieval schemes do not contain enough semantic information of the article and cannot fully reflect the semantic information of the *** this paper,we propose two secure and semantic retrieval schemes based on BERT(bidirectional encoder representations from transformers)named SSRB-1,*** training the documents with BERT,the keyword vector is generated to contain more semantic information of the documents,which improves the accuracy of retrieval and makes the retrieval result more consistent with the user’s ***,through testing on real data sets,it is shown that both of our solutions are feasible and effective.
Generative adversarial networks (GANs) are widely recognized for their impressive ability to generate realistic data. Despite the popularity of GANs, training them poses challenges such as mode collapse and instabilit...
详细信息
Federated learning achieves a certain degree of privacy protection by only uploading model parameters instead of the clients' raw data. However, attackers can still analyze model parameters to obtain sensitive dat...
详细信息
作者:
Zhang, XindiLi, BohanCai, ShaoweiInstitute of Software
Chinese Academy of Sciences School of Computer Science and Technology University of Chinese Academy of Sciences State Key Laboratory of Computer Science Beijing China
Satisfiability Modulo Theory (SMT) generalizes the propositional satisfiability problem (SAT) by extending support for various first-order background theories. In this paper, we focus on the SMT problems in Non-Linear...
详细信息
In modern real-time operating systems, complex task loads are often modeled as directed acyclic graphs (DAG) and executed in parallel on multiprocessor systems. The topological constraints present in DAG tasks prevent...
详细信息
A thorough evaluation of education quality can help schools, governments, and related organizations evaluate education quality, detect persistent problems, act quickly, and raise teaching and educational standards. Tr...
详细信息
Real-world applications often require teams of agents to coordinate strategies against adversaries. However, existing MARL models overlook resource constraints and task complexity, limiting their practical use. To add...
详细信息
Sharding is a promising technique to tackle the critical weakness of scalability in blockchain-based unmanned aerial vehicle(UAV)search and rescue(SAR)*** breaking up the blockchain network into smaller partitions cal...
详细信息
Sharding is a promising technique to tackle the critical weakness of scalability in blockchain-based unmanned aerial vehicle(UAV)search and rescue(SAR)*** breaking up the blockchain network into smaller partitions called shards that run independently and in parallel,shardingbased UAV systems can support a large number of search and rescue UAVs with improved scalability,thereby enhancing the rescue ***,the lack of adaptability and interoperability still hinder the application of sharded blockchain in UAV SAR *** refers to making adjustments to the blockchain towards real-time surrounding situations,while interoperability refers to making cross-shard interactions at the mission *** address the above challenges,we propose a blockchain UAV system for SAR missions based on dynamic sharding *** from the benefits in scalability brought by sharding,our system improves adaptability by dynamically creating configurable and mission-exclusive shards,and improves interoperability by supporting calls between smart contracts that are deployed on different *** implement a prototype of our system based on Quorum,give an analysis of the improved adaptability and interoperability,and conduct experiments to evaluate the *** results show our system can achieve the above goals and overcome the weakness of blockchain-based UAV systems in SAR scenarios.
Lesion detection in Computed Tomography(CT) images is a challenging task in the field of computer-aided *** important issue is to locate the area of lesion *** a branch of Convolutional Neural Networks(CNNs),3D Contex...
详细信息
Lesion detection in Computed Tomography(CT) images is a challenging task in the field of computer-aided *** important issue is to locate the area of lesion *** a branch of Convolutional Neural Networks(CNNs),3D Context-Enhanced(3DCE) frameworks are designed to detect lesions on CT *** False Positives(FPs) detected in 3DCE frameworks are usually caused by inaccurate region proposals,which slow down the inference *** solve the above problems,a new method is proposed,a dimension-decomposition region proposal network is integrated into 3DCE framework to improve the location accuracy in lesion *** the restriction of "anchors" on ratios and scales,anchors are decomposed to independent "anchor strings".Anchor segments are dynamically combined in accordance with probability,and anchor strings with different lengths dynamically compose bounding *** show that the accurate region proposals generated by our model promote the sensitivity of FPs and spend less inference time compared with the current methods.
Early depression detection is essential to enable healthcare professionals to effectively intervene and treat the depressive conditions. In existing research, an increasing number of psychological manifestations of de...
详细信息
暂无评论